‏إظهار الرسائل ذات التسميات Using. إظهار كافة الرسائل
‏إظهار الرسائل ذات التسميات Using. إظهار كافة الرسائل

الخميس، 14 مايو 2015

Using the SQL Developer to Browse NoSQL Datastores

Written by Eugene Simos

With the latest early adopter release of the SQL Developer, it's possible to browse your NoSQL datastores.We will use the BigData lite virtualbox appliance, and the latest early adopter SQL Developer, to demonstrate this feature.

The receipt is very simple:

1) Download the virtualbox Big Data lite appliance from:
http://www.oracle.com/technetwork/database/bigdata-appliance/oracle-bigdatalite-2104726.html
Follow the instructions to assemble the bits of the virtualbox into one single "ova" file. Import this file into your virtualbox installation, create the BigData lite VM and start it.

2) Download the Oracle SQL Developer 4.1 EA2 (4.1.0.18.37) release from:
http://www.oracle.com/technetwork/developer-tools/sql-developer/downloads/sqldev-41ea-2372780.html
I used the "Other Platforms" distribution (see below image). Download the Java 8 JDK (see below image).

3) Upload the SQL developer and the jdk to the virtualbox BigData Lite VM.

4) Install the jdk8 and the SQL Developer 4.1 into their own directories (I created a stage directory into an Oracle user home directory).

5) Start the NoSQL services from the panel of the virtualbox as below:

Image2

Start your SQL Developer 4.1 EA2 instance, from your installation directory.


Then in the right tab on the NoSQL connection, right click the link NoSQL connections.

Image3

Then provide all the connectivity information to your NoSQL store. In our case, the out-of-the box NoSQL installation is using the 5000 port, so we just accept the settings.

Image4

And finally, you will see the tables that are created in your NoSQL datastore. With this connection we are able to browse – i.e read only – the data as seen in the picture below:

Image5

Enjoy the rest of your developments on NoSQL with this new feature of the SQL developer.

If you would like to find out more about using Oracle NoSQL, I suggest taking the following Oracle University course:

Using Oracle NoSQL Database (4 days).

Explore all of the available training for Big Data appliance products.

About the Author

Eugen Simos

Eugene Simos is based in France and joined Oracle through the BEA-Weblogic Acquisition, where he worked for the Professional Service, Support and Education for major accounts across the EMEA Region. He worked in the banking sector, ATT and Telco companies giving him extensive experience on production environments. Eugene currently specializes in Oracle Fusion Middleware, teaching an array of courses on Weblogic/Webcenter, Content,BPM /SOA/Identity-Security/GoldenGate/Virtualisation/Unified Comm Suite) throughout the EMEA region.

Training On Demand - Using Oracle Database Vault with Oracle Database 12c

Written by Maria Billings, SeniorPrincipal Curriculum Developer

Do you want to advance your career, but never know beforehand when you might have time fortraining?

Try Oracle University’s Training On Demand or TOD curriculum. You can watch recordedclassroom and hands-on sessions in smaller or larger increments as it fits intoyour schedule.

For Database Vault

Doyou sometimes need to prove that you couldn't possibly have seen confidentialinformation, although you are a highly privileged DBA? Didyou know that the Oracle Database 12chas a Database Vault option already installed, ready to be enabled, if yourorganization decides to use it? Whatis Database Vault? DatabaseVault TOD Trainingis composed of several components, including realms, rule sets, command rules,secure application roles and factors that can be highly customized or simplyused out-of-the box.

A realm, for example, is a zone of protection for tables, roles, and packages.A realm protects the objects in it from users exercising system privileges,such as SELECT ANY TABLE. So, any such privileged user must be defined as arealm participant (or have a realm-participating role that is granted to him orher) to access the protected objects.

If you are not a realm participant or owner, you can show that a query of arealm-protected table will result in the "ORA-01031: insufficientprivileges" error. In short, you can prove you couldn't have possiblyseen the confidential content.

The course "UsingOracle Database Vault with Oracle Database 12c" TOD training goes into all the necessary details toshow you:

Howto reduce the attack surface for potential security breaches through limitingprivileges. Howto perform security analysis and report security vulnerabilities. Howto configure and maintain Database Vault elements. Howto implement best practices, which begins by identifying YOUR securityrequirements. You can then see samples of building and documenting security implementations, andyou view or discuss sample use cases, such as the workflow of an applicationDBA, dual key security, dynamic auditing, and so on.

Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable{mso-style-name:"Table Normal";mso-tstyle-rowband-size:0;mso-tstyle-colband-size:0;mso-style-noshow:yes;mso-style-priority:99;mso-style-qformat:yes;mso-style-parent:"";mso-padding-alt:0in 5.4pt 0in 5.4pt;mso-para-margin-top:0in;mso-para-margin-right:0in;mso-para-margin-bottom:10.0pt;mso-para-margin-left:0in;line-height:115%;mso-pagination:widow-orphan;font-size:11.0pt;font-family:"Calibri","sans-serif";mso-ascii-font-family:Calibri;mso-ascii-theme-font:minor-latin;mso-hansi-font-family:Calibri;mso-hansi-theme-font:minor-latin;}

Using Oracle Key Vault


Written by Maria Billings, Senior Principal Curriculum Developer

Security is an ongoing concern in the IT world. It's important to prove that reasonable precautions have been taken to secure data against potential attackers.

Encryption is a common way to do that, resulting in a proliferation of encryption keys, wallets, Java keystores, certificates and so on. To manage this multitude, Oracle Key Vault (OKV) provides a central software appliance. You can check YouTube for videos about which problems are being solved with this appliance.

In the Training On Demand course Using Oracle Key Vault, you'll dive into all the "How to" questions.

Learn To:

• Install and configure the central OKV software.
• Enroll database servers as "endpoints."
• Upload encryption keys for long-term retention.
• Rotate keys.
• Download keys.
• Use the direct connection between OKV and an Oracle Database 12c for TDE master keys.
• Back-up and restore OKV.

You learn this, and more, with the separation of administrative duties in place. Furthermore, you can provide positive proof of your adherence to security requirements with predefined reports and an automatic audit trail.

Preview Course
"Using Oracle Key Vault" TOD Course Description